Apple, The FBI, Richard Burr & Big Brother

burr
We’ve got an awful lot of folks out there thumping their chests and exhorting their law-and-order bona fides.  Heck, even Richard Burr is out there with legislation forcing cell phone companies to provide a “back door” for the feds.

We’ve got to let the FBI get into those terrorist phones!” And WHO can argue with that?

I — and some others — CAN and WILL.

El Rushbo had a great take on this: 

The story with Apple and the terrorists’ iPhone 5c and the FBI, the White House is weighing in on it. I think there needs to be some further explanation about what’s really going on here, folks. Because it’s become a PR battle, and it looks like Apple is gonna lose this, and it’s gonna be very tough to win because here we have a terrorist’s cell phone, and law enforcement wants in it and to find out what else might be planned, who else might be involved.

And it’s very tough to stand up for citizens’ privacy rights when the FBI and the White House say, “Hey,RushApple it’s just that one phone! Don’t panic here. All we want is that one phone!” But that’s not all they want. That’s not all. This is the federal government making a move on a private corporation. And this was a strategically planned — this was a specifically chosen event by the FBI. In fact, I don’t even think what’s on this phone is the real target for the FBI and the government. I think it’s just the way they’re getting in.

And just to set the table — and I’ll come back later and give you details of this. The best way that I have found to explain to people what’s going on here, is instead of this being a cell phone in possession of a dead terrorist, or a terrorist — a dead terrorist’s cell phone — think of it as a safe in the terrorist’s house. And think of it as a six-number combination safe, although the number of twists and turns really are not relevant for the discussion here.

The government says, “No, no, no! We just want that one safe. We, the government, just want the safe company to crack that one safe. We want them to give us the combination to that one safe.”

And everybody says, “Well, fine. What’s wrong with that? The terrorists are dead. Who knows what’s in that safe? Let’s go in there and get it!”

But that’s not what they’re asking for, and I’ll detail this in a moment. What the FBI is asking for is for the manufacturer — the safe company — to give them the combinations of every safe they have made and will make. That is essentially what the government, the FBI is asking of Apple.
“Give us the key that will allow us to crack any phone.” Now, they’re not saying that, but that’s going to be the ended result if the FBI wins this. And they probably will.

Because I don’t care how big Apple is: When the full force of the government comes at you, there’s any number of ways they can get what they want, abigbrothernd they can maybe structure it in such a way so that Apple appears to be hanging tough and hanging tough and hanging tough. And so they get the PR value of really hanging tough and trying to defend their customers, and at the end of the day they cave to it. More than likely, that’s going to happen. For all of you people concerned about privacy and security, this is one of the biggest — I don’t know — contradictions or dilemmas.

I mean, I hear from people all the time paranoid, scared to death that the NSA’s tracking them. The NSA’s listening to their phone calls. The NSA is activating the cameras on their phones and watching them. Particularly Millennials don’t like any of this invasion-of-privacy stuff. But all of a sudden everybody is demanding Apple give up and let the FBI into “this one phone.” It’s just curious, because when you dig into this and find out, it’s not just “this one phone,” and I don’t even think it’s this phone that’s really the ultimate, long-term target.

The FBI has been trying to get Apple to give them the code or the keys to break peer-to-peer encryption. That’s really what they want. They want to be able to decrypt your messages, your e-mails. And they need to get into your phones to be able to do that. In fact, look at… This is, I think, an interesting way to look at this. Look at how differently a publicly traded company views the security of its customers compared to Barack Obama and Hillary Clinton and agents of the federal government.

Look at how they protect, try to guarantee the safety and security of the citizens.spy

Wouldn’t it be nice if Obama and Hillary were doing everything they could to protect the American people from all of these threats from an open border, from Mexico, from ISIS? All of these migrants, all of these refugees, you think that’s not a security breach? You think those are not security breaches waiting to happen? Can you believe Apple is doing and appears to care much more about the privacy and security of their customers than the United States government seems to care about the privacy, security, and what have you, of American citizens?

Look how Hillary treated America’s secrets on her off-the-grid e-mail server. Look at all the top secret data she was trafficking in, all the top secret documents, e-mails, and so forth. Her e-mail server wasn’t secure. And it wasn’t just hers, was it? “Hey, we just want in on this one phone,” says Josh Earnest. “We just want in that one phone. We don’t want any others.” Yeah, it was just one Hillary e-mail server. Well, who else was she dealing with? Who else was able to traffic in these documents that Hillary was trafficking in?

Show of hands.  Who can remember the last time the federal government only took an inch when they COULD have had a mile? 

4 thoughts on “Apple, The FBI, Richard Burr & Big Brother

  1. Here we have Tricky Dick Burr doing what he always does, trying to enable the policies of the Obama regime. In this case it is to facilitate their police state tactics.

    This is just one more reason why Obama Republican Richard Burr simply has to go!

  2. Government, especially this criminal government, cannot be entrusted with this capability. Champions of data sweeps would have you believe that HUMINT, SIGINT, IMINT and a half-dozen other disciplines that comprise intelligence collection and production, do not count. There is a balance of these disciplines, sequenced and synchronized that provide the picture we need. Data sweeps alone are the lazy intel agency’s easy fix, if it weren’t that they don’t produce anything except to intrude on millions of American’s privacy, with the intent of archiving our activities for future exploitation. (On the other hand, software and database developers prosper under this panacea approach.) I’ve been watching these Beltway sub-species operate first hand for the past 45 years, and if you think they give a second’s thought to your and my rights, you are flat wrong. Let them do real intelligence collection the old fashioned way, work hard for it with all the tools they have now, and have had, at their disposal!

    1. And oh yeah, secure the borders so they don’t have to dream up more reasons to strip us of our 4th Amendment rights.

  3. Simple answer….Apple unlocks the ONE phone at their labs and sends the information to the FBI, then Apple relocks the phone. The FBI never gets their hands on it.

Comments are closed.